close
1.

図書

図書
Maritta Heisel, Peter Liggesmeyer, Stefan Wittmann (eds.)
出版情報: Berlin : Springer, c2004  xi, 337 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 3219
所蔵情報: loading…
目次情報: 続きを見る
Invited Talk
Why Safety and Security Should and Will Merge / A. Pfitzmann
Safety Cases
The Deconstruction of Safety Arguments Through Adversarial Counter-Argument / J.M. Armstrong ; S.E. Paynter
Using Fuzzy Self-Organising Maps for Safety Critical Systems / Z. Kurd ; T.P. Kelly
Using Formal Methods in a Retrospective Safety Case / L.-H. Eriksson
Reliability
A Highly Fault Detectable Cache Architecture for Dependable Computing / H.R. Zarandi ; S.G. Miremadi
An Empirical Exploration of the Difficulty Function / J.G.W. Bentley ; P.G. Bishop ; M. van der Meulen
Towards the Integration of Fault, Resource, and Power Management / T. Saridakis
Human Factors
Modeling Concepts for Safety-Related Requirements in Sociotechnical Systems / M. Cebulla
Analysing Mode Confusion: An Approach Using FDR2 / B. Buth
Handling Safety Critical Requirements in System Engineering Using the B Formal Method / D. Essame
Transportation
A Hybrid Testing Methodology for Railway Control Systems / G. De Nicola ; P. di Tommaso ; R. Esposito ; F. Flammini ; A. Orazzo
Actuator Based Hazard Analysis for Safety Critical Systems / P. Johannessen ; F. Torner ; J. Torin
Performability Measures of the Public Mobile Network of a Tele Control System / E. Ciancamerla ; M. Minichino
Software Development
PLC-Based Safety Critical Software Development for Nuclear Power Plants / J. Yoo ; S. Cha ; H.S. Son ; C.H. Kim ; J.-S. Lee
Compositional Hazard Analysis of UML Component and Deployment Models / H. Giese ; M. Tichy ; D. Schilling
Automatic Test Data Generation from Embedded C Code / E. Dillon ; C. Meudec
Fault Tree Analysis
State-Event-Fault-Trees - A Safety Analysis Model for Software Controlled Systems / B. Kaiser ; C. Gramlich
Safety Requirements and Fault Trees Using Retrenchment / R. Banach ; R. Cross
The Effects on Reliability of Integration of Aircraft Systems Based on Integrated Modular Avionics / D. Rehage ; U.B. Carl ; M. Merkel ; A. Vahl
Automotive Telematics - Road Safety Versus IT Security? / R.G. Herrtwich
Formal Methods and Systems
Modular Formal Analysis of the Central Guardian in the Time-Triggered Architecture / H. Pfeifer ; F.W. von Henke
Refinement of Fault Tolerant Control Systems in B / L. Laibinis ; E. Troubitsyna
Numerical Integration of PDEs for Safety Critical Applications Implemented by I&C Systems / M. Vollmer
Security and Quality of Service
An Integrated View of Security Analysis and Performance Evaluation: Trading QoS with Covert Channel Bandwidth / A. Aldini ; M. Bernardo
Dependability Benchmarking of Web-Servers / J. Duraes ; M. Vieira ; H. Madeira
Hazard and Risk Analysis
An Approach for Model-Based Risk Assessment / B.A. Gran ; R. Fredriksen ; A.P.-J. Thunem
How Explicit Are the Barriers to Failure in Safety Arguments? / S.P. Smith ; M.D. Harrison ; B.A. Schupp
Author Index
Invited Talk
Why Safety and Security Should and Will Merge / A. Pfitzmann
Safety Cases
2.

図書

図書
Kan Zhang, Yuliang Zheng (eds.)
出版情報: Berlin : Springer, c2004  xii, 442 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 3225
所蔵情報: loading…
目次情報: 続きを見る
Key Management
Practical Authenticated Key Agreement Using Passwords / Taekyoung Kwon
Further Analysis of Password Authenticated Key Exchange Protocol Based on RSA for Imbalanced Wireless Networks / Muxiang Zhang
Storage-Efficient Stateless Group Key Revocation / Pan Wang ; Peng Ning ; Douglas S. Reeves
Digital Signatures
Low-Level Ideal Signatures and General Integrity Idealization / Michael Backes ; Birgit Pfitzmann ; Michael Waidner
Cryptanalysis of a Verifiably Committed Signature Scheme Based on GPS and RSA / Julien Cathalo ; Benoît Libert ; Jean-Jacques Quisquater
How to Break and Repair a Universally Composable Signature Functionality / Dennis Hofheinz
New Algorithms
RSA Accumulator Based Broadcast Encryption / Craig Gentry ; Zulfikar Ramzan
Chameleon Hashing Without Key Exposure / Xiaofeng Chen ; Fangguo Zhang ; Kwangjo Kim
Radix-r Non-Adjacent Form / Tsuyoshi Takagi ; Sung-Ming Yen ; Bo-Ching Wu
Cryptanalysis
On Related-Key and Collision Attacks: The Case for the IBM 4758 Cryptoprocessor / Raphael C.-W. Phan ; Helena Handschuh
Security Analysis of Two Signcryption Schemes / Guilin Wang ; Robert H. Deng ; DongJin Kwak ; SangJae Moon
On The Security of Key Derivation Functions / Carlisle Adams ; Guenther Kramer ; Serge Mister ; Robert Zuccherato
Intrusion Detection
Evaluating the Impact of Intrusion Detection Deficiencies on the Cost-Effectiveness of Attack Recovery / Hai Wang ; Peng Liu ; Lunqun Li
A Model for the Semantics of Attack Signatures in Misuse Detection Systems / Michael Meier
Detection of Sniffers in an Ethernet Network / Zouheir Trabelsi ; Hamza Rahmani
Using Greedy Hamiltonian Call Paths to Detect Stack Smashing Attacks / Mark Foster ; Joseph N. Wilson ; Shigang Chen
Securing DBMS: Characterizing and Detecting Query Floods / Elisa Bertino ; Teodoro Leggieri ; Evimaria Terzi
Access Control
An XML-Based Approach to Document Flow Verification / Elena Ferrari ; Giovanni Mella
Model-Checking Access Control Policies / Dimitar P. Guelev ; Mark Ryan ; Pierre Yves Schobbens
A Distributed High Assurance Reference Monitor / Ajay Chander ; Drew Dean ; John Mitchell
Using Mediated Identity-Based Cryptography to Support Role-Based Access Control / D. Nali ; C. Adams ; A. Miri
Human Authentication
Towards Human Interactive Proofs in the Text-Domain (Using the Problem of Sense-Ambiguity for Security) / Richard Bergmair ; Stefan Katzenbeisser
Image Recognition CAPTCHAs / Monica Chew ; J.D. Tygar
Certificate Management
A Hierarchical Key-Insulated Signature Scheme in the CA Trust Model / Zhengyi Le ; Yi Ouyang ; James Ford ; Fillia Makedon
Certificate Recommendations to Improve the Robustness of Web of Trust / Qinglin Jiang
Mobile and Ad Hoc Security
Universally Composable Secure Mobile Agent Computation / Ke Xu ; Stephen R. Tate
Re-thinking Security in IP Based Micro-Mobility / Jukka Ylitalo ; Jan Melén ; Pekka Nikander ; Vesa Torvinen
Shared-Key Signature and Its Application to Anonymous Authentication in Ad Hoc Group / Qianhong Wu ; Changjie Wang ; Yumin Wang
Web Security
Prevent Online Identity Theft - Using Network Smart Cards for Secure Online Transactions / HongQian Karen Lu ; Asad Ali
Provable Unlinkability Against Traffic Analysis Already After <$>{\cal O}<$>(log(n)) Steps! / Marcin Gomułkiewicz ; Marek Klonowski ; Mirosław Kutyłowski
An Efficient Online Electronic Cash with Unlinkable Exact Payments / Toru Nakanishi ; Mitsuaki Shiota ; Yuji Sugiyama
Digital Rights Management
Modifiable Digital Content Protection in P2P / Heejae Park ; Jong Kim
Survey on the Technological Aspects of Digital Rights Management / William Ku ; Chi-Hung Chi
Detecting Software Theft via Whole Program Path Birthmarks / Ginger Myles ; Christian Collberg
Software Security
Effective Security Requirements Analysis: HAZOP and Use Cases / Thitima Srivatanakul ; John A. Clark ; Fiona Polack
The Obfuscation Executive / Kelly Heffner
Author Index
Key Management
Practical Authenticated Key Agreement Using Passwords / Taekyoung Kwon
Further Analysis of Password Authenticated Key Exchange Protocol Based on RSA for Imbalanced Wireless Networks / Muxiang Zhang
3.

図書

図書
Bruce Christianson ... [et al.] (eds.)
出版情報: Berlin ; Tokyo : Springer, c2004  viii, 241 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 2845
所蔵情報: loading…
4.

図書

図書
Dieter Hutter ... [et al.]
出版情報: Berlin ; Tokyo : Springer-Verlag, c2004  xi, 289 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 2802
所蔵情報: loading…
目次情報: 続きを見る
Invited Talks (Abstracts)
The Age of Pervasive Computing - Everything Smart, Everything Connected? / Friedemann Mattern
Cyber Assist Project and Its Security Requirement / Hideyuki Nakashima
Security in Pervasive Computin / Frank Stajano
The Importance of High Assurance Security in Pervasive Computing / Paul A. Karger
Location Privacy A Methodological Assessment of Location Privacy Risks in Wireless Hotspot
Networks / Marco Gruteser ; Dirk Grunwald
Protecting Access to People Location Information / Urs Hengartner ; Peter Steenkiste
Security Requirements
Smart Devices and Software Agents: The Basics of Good Behaviour / Howard Chivers ; John A. Clark ; Susan Stepney
Dependability Issues of Pervasive Computing in a Healthcare Environment / JurgenBohn ; FelixGartner ; HaraldVogt
Security Policies and Protection
Protecting Security Policies in Ubiquitous Environments
Using One-Way Functions / HakanKvarnstrom ; HansHedbom ; ErlandJonsson
Enforcing Security Policies via Types / Daniele Gorla ; Rosario Pugliese
Towards Using Possibilistic Information Flow Control to Design Secure Multiagent Systems / Axel Schairer
Authentication and Trust
Authentication for Pervasive Computing / Sadie Creese ; Michael Goldsmith ; Bill Roscoe ; Irfan Zakiuddin
End-to-End Trust Starts with Recognition / Jean-Marc Seigneur ; Stephen Farrell ; Christian Damsgaard Jensen ; Elizabeth Gray ; Yong Chen
Embedding Distance-Bounding Protocols within Intuitive Interactions / Laurent Bussard and Yves Roudier
Secure Infrastructures
Trust Context Spaces: An Infrastructure for Pervasive Security in Context-Aware Environments / Philip Robinson ; Michael Beigl
Time Constraint Delegation for P2P Data Decryption / Tie-Yan Li
SAOTS: A New Efficient Server Assisted Signature Scheme for Pervasive Computing / Kemal Bicakci ; Nazife Baykal
Smart Labels
Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems / Stephen A. Weis ; Sanjay E. Sarma ; Ronald L. Rivest ; Daniel W. Engels
Verification
Implementing a Formally Verifiable Security Protocol in Java Card / Engelbert Hubbers ; Martijn Oostdijk ; Erik Poll
Hardware Architectures
Cellular Automata Based Multiplier for Public-Key Cryptosystem / Hyun-Sung Kim ; Kee-Young Yoo
Enlisting Hardware Architecture to Thwart Malicious Code Injection / Ruby B. Lee ; David K. Karig ; John P. McGregor ; Zhijie Shi
Optimized RISC Architecture for Multiple-Precision Modular Arithmetic / Johann Großschadl ; Guy-Armand Kamendje
Visual Crypto Displays Enabling Secure Communications / Pim Tuyls ; Tom Kevenaar ; Geert-Jan Schrijen ; Toine Staring ; Marten van Dijk
Workshop
Security and Privacy in Pervasive Computing State of the Art and Future Directions / Dieter Hutter ; Werner Stephan ; Markus Ullmann
Author Index
Invited Talks (Abstracts)
The Age of Pervasive Computing - Everything Smart, Everything Connected? / Friedemann Mattern
Cyber Assist Project and Its Security Requirement / Hideyuki Nakashima
5.

図書

図書
Moni Naor (Ed.)
出版情報: Berlin : Springer, c2004  xi, 521 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 2951
所蔵情報: loading…
6.

図書

図書
Ton Kalker, Ingemar J. Cox, Yong Man Ro (eds.)
出版情報: Berlin ; Tokyo : Springer, c2004  xii, 602 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 2939
所蔵情報: loading…
7.

図書

東工大
目次DB

図書
東工大
目次DB
Feng Bao, Robert Deng, Jianying Zhou (eds.)
出版情報: Berlin ; Tokyo : Springer, c2004  xi, 454 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 2947
所蔵情報: loading…
目次情報: 続きを見る
A Generalized Wiener Attack on RSA Johannes Bloemer and Alexander May 1
Cryptanalysis of a Public-Key Encryption Scheme Based on the Polynomial Reconstruction Problem Jean-Sebastien Coron 14
Faster Scalar Multiplication on Koblitz Curves Combining Point Halving with the Frobenius Endomorphism Roberto Maria Avanzi, Mathieu Ciet, and Francesco Sica 28
Application of Montgomery's Trick to Scalar Multiplication for Elliptic and Hyperelliptic Curves Using a Fixed Base Point Pradeep Kumar Mishra and Palash Sarkar 41
Fast Arithmetic on Jacobians of Picard Curves Stephane Flon and Roger Oyono 55
Undeniable Signatures Based on Characters: How to Sign with One Bit Jean Monnerat and Serge Vaudenay 69
Efficient Extension of Standard Schnorr/RSA Signatures into Universal Designated-Verifier Signatures Ron Steinfeld, Huaxiong Wang, and Josef Pieprzyk 86
Constructing Committed Signatures from Strong-RSA Assumption in the Standard Complexity Model Huafei Zhu 101
Constant Round Authenticated Group Key Agreement via Distributed Computation Emmanuel Bresson and Dario Catalano 115
Efficient ID-based Group Key Agreement with Bilinear Maps Kyu Young Choi, Jung Yeon Hwang, and Dong Hoon Lee 130
New Security Results on Encrypted Key Exchange Emmanuel Bresson, Olivier Chevassut, and David Pointcheval 145
New Results on the Hardness of Diffie-Hellman Bits Maria Isabel Gonzalez Vasco, Mats Naeslung, and Igor E. Shparlinski 159
Short Exponent Diffie-Hellman Problems Takeshi Koshiba and Kaoru Kurosawa 173
Efficient Signcryption with Key Privacy from Gap Diffie-Hellman Groups Benoit Libert and Jean-Jacques Quisquater 187
Algebraic Attacks over GF(2k), Application to HFE Challenge 2 and Sflash-v2 Nicolas T. Courtois 201
Secret Exponent Attacks on RSA-type Schemes with Moduli N=Prq Alexander May 218
General Group Authentication Codes and Their Relation to "Unconditionally-Secure Signatures" Reihaneh Safavi-Naini, Luke McAven, and Moti Yung 231
From Digital Signature to ID-based Identification/Signature Kaoru Kurosawa and Swee-Huay Heng 248
Identity-Based Threshold Decryption Joonsang Baek and Yuliang Zheng 262
An Efficient Signature Scheme from Bilinear Pairings and Its Applications Fangguo Zhang, Reihaneh Safavi-Naini, and Willy Susilo 277
An RSA Family of Trap-Door Permutations with a Common Domain and Its Applications Ryotaro Hayashi, Tatsuaki Okamoto, and Keisuke Tanaka 291
A New Variant of the Matsumoto-Imai Cryptosystem through Perturbation Jintai Ding 305
Efficient, Verifiable Shuffle Decryption and Its Requirement of Unlinkability Jun Furukawa 319
A Point Compression Method for Elliptic Curves Defined over GF(2n) Brian King 333
On the Optimal Parameter Choice for Elliptic Curve Cryptosystems Using Isogeny Toru Akishita and Tsuyoshi Takagi 346
On the Security of Multiple Encryption or CCA-security+CCA-security=CCA-security? Rui Zhang, Goichiro Hanaoka, Junji Shikata, and Hideki Imai 360
QuasiModo: Efficient Certificate Validation and Revocation Farid F. Elwailly, Craig Gentry, and Zulfikar Ramzan 375
A Distributed Online Certificate Status Protocol with a Single Public Key Satoshi Koga and Kouichi Sakurai 389
A First Approach to Provide Anonymity in Attribute Certificates Vicente Benjumea, Javier Lopez, Jose A. Montenegro, and Jose M. Troya 402
A Nonuniform Algorithm for the Hidden Number Problem in Subgroups Igor E. Shparlinski and Arne Winterhof 416
Cryptographic Randomized Response Techniques Andris Ambainis, Markus Jakobsson, and Helger Lipmaa 425
A Correct, Private, and Efficient Mix Network Kun Peng, Colin Boyd, Ed Dawson, and Kapali Viswanathan 439
Author Index 455
A Generalized Wiener Attack on RSA Johannes Bloemer and Alexander May 1
Cryptanalysis of a Public-Key Encryption Scheme Based on the Polynomial Reconstruction Problem Jean-Sebastien Coron 14
Faster Scalar Multiplication on Koblitz Curves Combining Point Halving with the Frobenius Endomorphism Roberto Maria Avanzi, Mathieu Ciet, and Francesco Sica 28
8.

図書

東工大
目次DB

図書
東工大
目次DB
Tatsuaki Okamoto (ed.)
出版情報: Berlin ; Tokyo : Springer, c2004  xi, 386 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 2964
所蔵情報: loading…
目次情報: 続きを見る
Symmetric Encryption
   Online Encryption Schemes: New Security Notions and Constructions Alexandra Boldyreva, Nut Taesombut 1
   Related-Key Attacks on Triple-DES and DESX Variants Raphael C.-W. Phan 15
   Design of AES Based on Dual Cipher and Composite Field Shee-Yau Wu, Shih-Chuan Lu, Chi Sung Laih 25
   Periodic Properties of Counter Assisted Stream Ciphers Ove Scavenius, Martin Boesgaard, Thomas Pedersen, Jesper Christiansen, Vincent Rijmen 39
   A Fast Correlation Attack via Unequal Error Correcting LDPC Codes Maneli Noorkami, Faramarz Fekri 54
Aymmetric Encryption
   κ-Resilient Identity-Based Encryption in the Standard Model Swee-Huay Heng, Kaoru Kurosawa 67
   A Generic Construction for Intrusion-Resilient Public-Key Encryption Yevgeniy Dodis, Matt Franklin, Jonathan Katz, Atsuko Miyaji, Moti Yung 81
Digital Signatures
   A Certificate-Based Signature Scheme Bo Gyeong Kang, Je Hong Park, Sang Geun Hahn 99
   Identity Based Undeniable Signatures Benoit Libert, Jean-Jacques Quisquater 112
   Compressing Rabin Signatures Daniel Bleichenbacher 126
Protocols
   A Key Recovery System as Secure as Factoring Adam Young, Moti Yung 129
   Server Assisted Signatures Revisited Kemal Bicakci, Nazife Baykal 143
   Cryptanalysis of a Zero-Knowledge Identification Protocol of Eurocrypt '95 Jean-Sebastien Coron, David Naccache 157
   Universal Re-encryption for Mixnets Philippe Golle, Markus Jakobsson, Ari Juels, Paul Syverson 163
   Bit String Commitment Reductions with a Non-zero Rate Anderson C.A. Nascimento, Joern Mueller-Quade, Hideki Imai 179
   Improving Robustness of PGP Keyrings by Conflict Detection Qinglin Jiang, Douglas S. Reeves, Peng Ning 194
Side-Channel Attacks
   Issues of Security with the Oswald-Aigner Exponentiation Algorithm Colin D. Walter 208
   Hardware Countermeasures against DPA - A Statistical Analysis of Their Effectiveness Stefan Mangard 222
   Self-Randomized Exponentiation Algorithms Benoit Chevallier-Mames 236
Hardwares
   Flexible Hardware Design for RSA and Elliptic Curve Cryptosystems Lejla Batina, Geeke Bruin-Muurling, Siddika Berna Oers 250
   High-Speed Modular Multiplication Wieland Fischer, Jean-Pierre Seifert 264
   Yet Another Sieving Device Willi Geiselmann, Rainer Steinwandt 278
Mode of Operations
   A Parallelizable Enciphering Mode Shai Halevi, Phillip Rogaway 292
   Padding Oracle Attacks on the ISO CBC Mode Encryption Standard Kenneth G. Paterson, Arnold Yau 305
Hash and Hash Chains
   A 1 Gbit/s Partially Unrolled Architecture of Hash Functions SHA-1 and SHA-512 Roar Lien, Tim Grembowski, Kris Gaj 324
   Fast Verification of Hash Chains Marc Fischlin 339
Visual Cryptography
   Almost Ideal Contrast Visual Cryptography with Reversing Duong Quang Viet, Kaoru Kurosawa 353
Ellictic Curve Cryptosystems
   Weak Fields for ECC Alfred Menezes, Edlyn Teske, Annegret Weng 366
Author Index 387
Symmetric Encryption
   Online Encryption Schemes: New Security Notions and Constructions Alexandra Boldyreva, Nut Taesombut 1
   Related-Key Attacks on Triple-DES and DESX Variants Raphael C.-W. Phan 15
9.

図書

図書
[sponsored by IEEE Computer Society Task Force on Information Assurance, IEEE Computer Society Mass Storage Systems Technical Committee]
出版情報: Los Alamitos, Calif. : IEEE Computer Society, c2004  v, 78 p. ; 28 cm
所蔵情報: loading…
目次情報: 続きを見る
Decentralized Authentication Mechanisms for Object-Based Storage Devices / V. Kher ; Y. Kim
Fast and Secure Magnetic WORM Storage Systems / Y. Wang ; Y. Zheng
Key Management for Encrypted Data Storage in Distributed Systems / L. Seitz ; J.-M. Pierson ; L. Brunie
Information Security on the Logistical Network: An End-to-End Approach / M. Beck ; J. Plank ; J. Millar ; S. Atchley ; S. Soltesz ; A. Bassi ; H. Liu
Implementation of a Storage Mechanism for Untrusted DBMSs / E. Damiani ; S. di Vimercati ; M. Finetti ; S. Paraboschi ; P. Samarati ; S. Jajodia
Cryptographic File Systems Performance: What You Don't Know Can Hurt You / C. Wright ; J. Dave ; E. Zadok
Memories: A Survey of Their Secure Uses in Smart Cards / M. Neve ; E. Peeters ; D. Samyde ; J.-J. Quisquater
The Object Store Security Protocol / M. Factor ; D. Naor ; N. Rinetzky ; J. Satran ; D. Nagle ; D. Beaver ; E. Riede
IEEE Standard for Encrypted Storage / J. Hughes
Research and Implement of an Encrypted File System Used to NAS / H. Jianzhong ; X. Changsheng ; C. Bin
Author Index
Decentralized Authentication Mechanisms for Object-Based Storage Devices / V. Kher ; Y. Kim
Fast and Secure Magnetic WORM Storage Systems / Y. Wang ; Y. Zheng
Key Management for Encrypted Data Storage in Distributed Systems / L. Seitz ; J.-M. Pierson ; L. Brunie
10.

図書

図書
ACM Workshop on XML Security ; Association for Computing Machinery ; Association for Computing Machinery. Special Interest Group on Security, Audit, and Control ; ACM Conference on Computer and Communications Security
出版情報: New York, N.Y. : Association for Computing Machinery, c2004  vi, 121 p. ; 28 cm
所蔵情報: loading…
文献の複写および貸借の依頼を行う
 文献複写・貸借依頼